1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nuetrik [128]
3 years ago
6

Your boss has asked you to create a customized letterhead for the business, "Boyne Mountain Ski Shop". Explain how to create the

letterhead and what information you would include.
Computers and Technology
1 answer:
lakkis [162]3 years ago
5 0

Creating a letter head is very simple. However, you need to do some planning. You are required to pick a size and shape accordingly. I would prefer a landscape oriented rectangle. Select a theme appropriate and consistent with the traits of you company. Personalize with a simple and sleek image that can be printed easily if necessary. Select a font that is bold enough, readable, and eye catching. You can include items like a slogan, a name, phone numbers, address, email address, a link to you web address and the established dates.

You might be interested in
The standard computer keyboard is implemented using_______ A:BCD code B:Gray code C:ASCII code D:reflected code
Tasya [4]

Answer:

C. ASCII code

Explanation:

Reflected code is another term for gray code so you can cross both out.

BCD code is binary decimal code used in scientific and graphic calculators

ASCII code is the only one use in a computer keyboard so I'm guessing that's the answer. :)

6 0
3 years ago
Read 2 more answers
A protocol is:
Setler [38]

Answer:

The answer is: B) a standard set of rules and procedures for control of communications in a network .

Explanation:

To exchange information between computers across a network, there must be a preexisting agreement as to how the information will be structured and how the sender and receiver will behave. Without a protocol, receive or send information, the communication between computers will be impossible. The computer protocol is OSI (Open Systems Interconnection) sets guidelines for implementing networking communications between computers.

8 0
3 years ago
Dust buildup inside a desktop PC case can be managed effectively by ____.
antoniya [11.8K]
Frequent cleaning with an air duster can would do the job
6 0
3 years ago
Read 2 more answers
If x has a value of 7 and y has a value of 20, what is displayed as a result of executing the code segment
Llana [10]

<em>6.65 </em><em>is displayed as the</em><em> output </em><em>of the </em><em>block of code</em>

<em />

In python programming, * denotes multiplication. To get the output, we will substitute the value of x and y given into the result to have;

<em> result = x * y - x / (y)</em>

<em> result = 7 * 20 - 7 / (20)</em>

<em> result = 140 - 7 / (20)</em>

<em> result = 133/20</em>

<em> result = 6.65</em>

<em />

<em>This shows that </em><em>6.65 </em><em>is displayed as the</em><em> output </em><em>of the </em><em>block of code</em>

<em />

The question is incomplete;

Let the code segment be

<em>>>> x = 7 </em>

<em>>>> y = 20   </em>

<em>>>> result = x * y - x / (y) </em>

<em>>>> result  </em>

<em>output:__?</em>

<em />

Learn more here: brainly.com/question/24240957

5 0
3 years ago
In the implementation of the getMax() function in the PriQueue class, we need to read and write the variables "front" and "rear"
natka813 [3]

Answer:

The answer to the given question is "yes".

Explanation:

In the programming language, Protected is a keyword that is used as an access modifier by using protected members we only access within the same class and it also provides access to use this member in the derived class that is inherited by derived class from the base class.

That's why the answer to this question is "yes".

4 0
3 years ago
Other questions:
  • This career involves answering questions about computer parts and trouble shooting broken computers? Video game designer, comput
    10·1 answer
  • If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to st
    7·1 answer
  • A phonebook typically lists the name, address, and telephone number of everyone living in an area. Write code defining a structu
    15·1 answer
  • Charles Montesquieu believed that the
    15·2 answers
  • Gold jewellery is made when solid-gold is melted and then put into containers which are the shape of the jewellery. After this t
    9·1 answer
  • How can computational thinking techniques be applied to software development
    6·1 answer
  • Why do many experts recommand longer time horizonal if you are doing high risk investment
    7·1 answer
  • How is video compression accomplished?
    14·1 answer
  • What combination of keys will autofill highlighted cells to the right?
    10·1 answer
  • A specific type of computer program that manages the other programs on a computer
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!